Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3872

Опубликовано: 07 окт. 2021
Источник: redhat
CVSS3: 6.6

Описание

vim is vulnerable to Heap-based Buffer Overflow

An out-of-bounds write flaw was found in vim's drawscreen.c win_redr_status() function. This flaw allows an attacker to trick a user to open a crafted file with specific arguments in vim, triggering an out-of-bounds write. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.

Отчет

This flaw is out of support scope for vim as shipped in Red Hat Enterprise Linux 6 and 7. For more comprehensive information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata/

Меры по смягчению последствий

Since this flaw requires user interaction, mitigation is to not open files from untrusted sources using vim.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/openshift-hive-rhel8Not affected
Red Hat Enterprise Linux 6vimOut of support scope
Red Hat Enterprise Linux 7vimOut of support scope
Red Hat Enterprise Linux 9vimNot affected
Red Hat Enterprise Linux 8vimFixedRHSA-2022:036601.02.2022
Red Hat Enterprise Linux 8vimFixedRHSA-2022:036601.02.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2016056vim: heap-based buffer overflow in win_redr_status() in drawscreen.c

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

vim is vulnerable to Heap-based Buffer Overflow

CVSS3: 7.8
nvd
больше 4 лет назад

vim is vulnerable to Heap-based Buffer Overflow

CVSS3: 7.8
msrc
больше 4 лет назад

Heap-based Buffer Overflow in vim/vim

CVSS3: 7.8
debian
больше 4 лет назад

vim is vulnerable to Heap-based Buffer Overflow

CVSS3: 7.8
github
больше 3 лет назад

vim is vulnerable to Heap-based Buffer Overflow

6.6 Medium

CVSS3